May 02, 2024NewsroomVulnerability / Android
Several popular Android applications available in Google Play Store are susceptible to a path traversal-affiliated vulnerability that could be...
A never-before-seen botnet called Goldoon has been observed targeting D-Link routers with a nearly decade-old critical security flaw with the goal of using...
May 02, 2024NewsroomCyber Attack / Data Breach
Cloud storage services provider Dropbox on Wednesday disclosed that Dropbox Sign (formerly HelloSign) was breached by unidentified...
Like antivirus software, vulnerability scans rely on a database of known weaknesses.
That's why websites like VirusTotal exist, to give cyber practitioners a chance...
May 02, 2024NewsroomVulnerability / Data Breach
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical flaw impacting GitLab to its Known...
May 02, 2024NewsroomCyber Espionage / Network Security
A new malware called Cuttlefish is targeting small office and home office (SOHO) routers with the goal...
May 01, 2024NewsroomFinancial Crime / Forensic Analysis
A forensic analysis of a graph dataset containing transactions on the Bitcoin blockchain has revealed clusters associated...